IT404 Module 09
IT404 Module 09
Network Security
Module 09
Malicious Software
MAIN REFERENCE
• Network Security Bible, 2nd Edition, Eric Cole, Wiley, 2009.
Learning Outcomes
1 2 3 4
• To differentiate • To discuss • To describe • To elaborate on
between various nature, various worm virus, worm and
malicious classification technology and DDoS
programs countermeasures
and virus kits countermeasures
Terminology for Malicious Software
9.1 Backdoor or Trapdoor
Infection mechanism
The means by which a virus spreads or
Also referred to as the infection vector
propagates, enabling it to replicate
Trigger
The event or condition that determines
Sometimes known as a logic bomb
when the payload is activated or delivered
Payload
May involve damage or benign but
What the virus does, besides spreading
noticeable activity
9.7 Virus phases
During its lifetime, a typical virus goes through the following four phases:
File sharing
Ultrafast
Multiplatform Multi-exploit Polymorphic
spreading
Transport Zero-day
Metamorphic
vehicles exploit
9.15 Perimeter worm countermeasures
Continued . . .
(Class D) Threshold random walk (TRW) scan detection
• Exploits randomness in picking designations to connect to as a way of
detecting if a scanner is in operation
(Class E) Rate limiting
• This class limits the rate of scanlike traffic from an infected host
Attack source
traceback and
Attack prevention and identification
preemption (before (during and after the
the attack) attack)